Get a Pentest and security assessment of your IT network.

News

SHA-3 hash competition concludes, and the winner isKeccak!

In computer science, a hash is a function that takes arbitrary binary data and converts it into a fixed-length digital fingerprint. The size of the hash (usually measured in bits) needs to be large enough that its vanishingly unlikely for you to get a match by chance. In recent years, some clouds have begun to cast a shadow over the Merkle-Damgrd system. NIST announced a public competition to deliver Secure Hash Algorithm 3 (SHA-3)”]

Source: https://nakedsecurity.sophos.com/2012/10/04/sha-3-hash-competition-concludes-keccak/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones